General

  • Target

    95c9551dc14d40fbf3935862ffa2ba3702e6a9042609e8fecf012ce93c0ead85.exe

  • Size

    45KB

  • Sample

    241219-lm1tjsypgs

  • MD5

    0e594ddf79d7d16fb7109b8ec847f764

  • SHA1

    7d50f219f505353c186a868bd217d300b0087ce8

  • SHA256

    95c9551dc14d40fbf3935862ffa2ba3702e6a9042609e8fecf012ce93c0ead85

  • SHA512

    8f18480c36cfb81af1fe29aef040889d331772c3bb0fcd46170d890e5b2beca0708ab27ae5bf1bb7f2992073fd064bfafd3c3859ce042a5aa875d965fffd1d52

  • SSDEEP

    768:QhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:ssWE9N5dFu53dsniQaB/xZ14n7zIF+qD

Malware Config

Targets

    • Target

      95c9551dc14d40fbf3935862ffa2ba3702e6a9042609e8fecf012ce93c0ead85.exe

    • Size

      45KB

    • MD5

      0e594ddf79d7d16fb7109b8ec847f764

    • SHA1

      7d50f219f505353c186a868bd217d300b0087ce8

    • SHA256

      95c9551dc14d40fbf3935862ffa2ba3702e6a9042609e8fecf012ce93c0ead85

    • SHA512

      8f18480c36cfb81af1fe29aef040889d331772c3bb0fcd46170d890e5b2beca0708ab27ae5bf1bb7f2992073fd064bfafd3c3859ce042a5aa875d965fffd1d52

    • SSDEEP

      768:QhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:ssWE9N5dFu53dsniQaB/xZ14n7zIF+qD

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks